ClearPass Policy Manager 6.x
|
|
|
- Bonnie Peters
- 10 years ago
- Views:
Transcription
1 ClearPass Policy Manager 6.x Tech Note: ClearPass Palo Alto Networks Integration with CPPM Version Date Modified By Comments 1.0 May 2013 Danny Jump Initial Integration Guide V1 2.0 June 2013 Danny Jump Minor updates for CPPM Sept 2013 Danny Jump Updates to support CPPM 6.2, changes to post_auth and Troubleshooting section 4.0 Feb 2014 Danny Jump Updates to support CPPM 6.3, changes to post_auth and details on our HIP support 5.0 May 2015 Danny Jump Updates to support changes in CPPM 6.5
2 Overview... 6 Why is this Integration Important?... 6 The Challenge... 6 Background... 7 Next- Generation Solution... 7 Software Requirements... 8 ClearPass Configuration... 8 What s new in CPPM 6.5?... 8 CPPM Basic Configuration - All CPPM Versions... 9 CPPM Basic Configuration - Insight... 9 CPPM Basic Configuration - Interim Accounting NAS/NAD Basic Configuration Interim Accounting CPPM Basic Configuration Post_authentication processing post_authentication configuration for CPPM 6.5/6.4/ Real- Time Framework introduced post CPPM post_authentication configuration for CPPM 6.1 and Adding PANW Firewall & Panorama context servers endpoints Adding PANW Context Servers in CPPM 6.5 & Adding Palo Alto Networks Panorama Context Server Endpoint Summary of Shared Context Attributes Triggering Updates from ClearPass to a PANW endpoint post Triggering Updates from ClearPass to a PANW endpoint pre Adding an Enforcement Profile to a Enforcement Policy Adding an Enforcement Policy to a Service Policy Sending Health/Posture status to PANW from CPPM
3 Configuring OnGuard on ClearPass Configuring PANW to use Health/Posture context Configuring TAGS for Health/Posture Setting the CPPM Posture/Health Delay Timer Configuring Palo Alto Networks Next- Generation Firewall Configuring CPPM to communicate just using the XMLAPI Configuring a Policy on PANW to use CPPM context data generic info Creating Device Profile Categories Configuring Palo Alto Networks PAN- OS 6.x - Tags and HIP Objects Other Attributes from HIP Object/General explained Configuring Palo Alto Networks PAN- OS 5.x - Dynamic- Objects PAN- OS 6.x Changes to DAO Limits Faultfinding Tips (PANOS cli cmds/cppm Logs) UserID <- > IP Address Mapping (PAN- OS 5.x & 6.x cmd) Dynamic Device (Tag) <- > IP Address Mapping (PAN- OS 5.x & 6.x cmd) Show HIP Reports Show XMLAPI statistics Active real- time debug monitoring of the UserID process Check Logs files in CPPM Sending login UserID + Source IP@, as user logs in Adding IP@ to Category, as CPPM profiles the IP@ Sending logoff UserID + IP@, as user logouts Removing IP@ from Category as device logout XML example of HIP Object Conclusion
4 Figure 1 - ClearPass and Palo Alto Networks Integration Overview... 7 Figure 2 - Checking Insight DB is enabled... 9 Figure 3 - Checking RADIUS Interim- Accounting is enabled on CPPM Figure 4 - Enable RADIUS Interim accounting on Aruba Controller Figure 5 - Configuring RADIUS authentication on Cisco WLC Figure 6 - Configuring RADIUS accounting on Cisco WLC Figure 7 - Post Authentication run- times across different CPPM versions Figure 8 - Modifying the Post- authentication daemon sleep- time under CPPM 6.5/6.4/ Figure 9 - Modifying the post_authentication daemon sleep- time under CPPM 6.1.x Figure 10 - Modifying the post_authentication daemon sleep- timer under CPPM 6.2.x Figure 11 - Adding a Palo Alto Networks Firewall in CPPM 6.5 & Figure 12 - Appending DOMAIN/Full- username Figure 13 - Adding Palo Alto Networks Panorama endpoint Figure 14 - Attributes we can share with Palo Alto Networks endpoints Figure 15 - Adding an enforcement- profile for PANW in CPPM Figure 16 - Adding a Session Restriction Enforcement profile Figure 17 - Adding a Session- Check... one endpoint per profile Figure 18 - Trigger PANW update on AD memberof Figure 19 - PANW enforcement profile added to a service policy Figure 20 - Configuring TAGS on PANW Figure 21 Copy of Not_Healthy TAGS Figure 22 - Creating an Address- Group to match on ANYTHING unhealthy Figure 23 - Creating different Address- groups to check on individual failures Figure 24 - Adding an Address- group to and firewall policy Figure 25 - Setting Eager handler to 120 seconds when sending posture/health Figure 26 - Creating an restricted Admin- Role Figure 27 - Adding a User to Palo Alto Networks Firewall Figure 28 - CPPM Fingerprints Figure 29 - Adding a TAG under PAN- OS 6.x Figure 30 - Grouping Tags into a Dynamic Address Group Figure 31 - Creating HIP Objects Figure 32 - CPPM Fingerprints Client Version Figure 33 - Utilizing Tags in a Firewall Rule Figure 34 - Configuring Dynamic Objects under PAN- OS 5.x Figure 35 - Palo Alto Networks 'dynamic' objects Figure 36 - Basic Firewall Rules Figure 37 - Firewall Rule Based Upon a Source- Device- Type of an endpoint Figure 38 - Firewall Rule Based Upon a Source of a User Name Figure 39 - Signed in User s to their IP Mapping Figure 40 Signed in Users to their IP Mapping and also matched policy hits Figure 41 - Dynamic Object Category - IP Address Mapping Figure 42 - Logged in user in PAN- OS 6.x Figure 43 - HIP Report for a user Figure 44 - XMLAPI Stats Figure 45 - List of ALL users registered through ID Manager
5 Figure 46 - How to collect CPPM Logs limited data, but includes postautctrl.log Figure 47 - Collection of CPPM Logs complete Figure 48 - Where to locate postauthctrl.log
6 Overview This document is intended to help field engineering, customers, and channel partners integrate Aruba Networks ClearPass 6.X with Palo Alto Networks next- generation firewall and its central management system, Panorama. Customers can now leverage the Identity tracking features provided by ClearPass for known enterprise users using Active Directory and LDAP server, and for unknown guest/public user credentials that are used by Guest and HotSpot networks. Note: Where you see a red- chili this is to signify a hot important point and highlights that this point is to be taken as a best- practice recommendation. Why is this Integration Important? Palo Alto Networks next- generation firewall offers contextual security for all users for a number of reasons especially for safe enablement of applications. Simple firewalling beyond basic IP address or TCP port numbers only provides a subset of the enhanced security required for enterprises to secure their networks. As an example, it s no longer acceptable to just deny Twitter or deny Facebook access. Many organizations use social networking Web sites to advertise their products, solutions, and activities. Social networking has become an accepted marketing tool and many companies now opt to use this as a mainstream part of their marketing efforts. As such, legacy firewalls are not able to differentiate valid authorized users from casual social networking users. So today s challenge to allow Facebook based upon contextual data such as username makes it almost impossible for legacy firewalls to implement granularity in security policy. The Challenge Historically, traditional firewalls make decisions based on Layer3/4 and some Layer7 information. For Web- based traffic, a decision would typically be based upon a domain or a URL string. Today, enterprises want to make decisions based upon the user and associated permissions, and, for this to happen, the firewall needs to correlate between the user and the assigned IP address. The challenge is finding meaningful sources of user information covering the full spectrum of network activity, including known users, guests, and non- enterprise configured users. 6
7 Background One of the core features of the Palo Alto Networks next- generation firewall is User- ID, which provides many methods for connecting to sources of identity information and associating them with firewall policy rules. For example, it has an option to gather user information from an Active Directory or LDAP server. In the past, this functionality required the use of a Palo Alto Networks User- ID agent running on a Windows workstation. Similarly, an agent can be used to allow integration with a legacy Amigopod deployment to gather user information for the guest users. This integration allowed Amigopod to send user information to a Palo Alto Networks firewall via the User- ID agent running on a Windows workstation. In both scenarios above, the past approaches required an agent, which created dependencies that might not be easy to resolve in certain deployment scenarios. Now you can take advantage of the Palo Alto Networks PAN- OS and Aruba Networks ClearPass Policy Manager, making a more seamless integration possible. Next- Generation Solution Starting with the release of ClearPass Policy Manager 6.1, Aruba re- architected the integration between ClearPass and the Palo Alto Networks next- generation firewall to take advantage of the new XML APIs that were available in the PAN OS 5.x code release. This simplified the solution significantly by making it more efficient and streamlined. The requirement to download and configure a separate plug- in was eliminated and instead the solution was fully integrated into the ClearPass core product. Figure 1 - ClearPass and Palo Alto Networks Integration Overview 7
8 Software Requirements The minimum software version required on ClearPass Policy Manager is 6.1.0, released in April The minimum software version on the Palo Alto Networks firewall is PAN- OS 5.0.0, released in November However, it is recommended that you regularly review software updates to utilize the benefits from the latest fixes and feature updates from Aruba and Palo Alto Networks. ClearPass Configuration Configuring ClearPass Policy Manager for Palo Alto Networks firewall integration is a fairly simple straightforward process. Step- by- step instructions are outlined in the following sections. The configuration has been separated into several sections. The first being to highlight the new functionality in CPPM 6.5, then several sections covering the basics for multiple releases and then some of the nuances for the older ClearPass releases. The enhanced ClearPass Policy Manager Exchange framework added in 6.5 allows us to enhance the integration with additional 3 rd party vendors. This allows us to push the endpoint source IP address, username and other attributes to other 3 rd party firewalls (e.g. Checkpoint, Fortinet, and iboss). This information can be located in the TechNote section on the Aruba Support Site. What s new in CPPM 6.5? Within the latest release of ClearPass, version 6.5 released in March 2015, we added some new features and tweaked a couple of older features to improve their function. Firstly, we added the ability for Policy Manager, when it s aware of posture/health for an endpoint, to now share this context. CPPM gathers different health class information from our OnGuard client, context such as the state of the endpoint firewall (enabled/disabled, engine version), derives a posture state, and then return a healthy/un- healthy state per class back to the PANW firewall. There are 10 classes we can report against and they are covered later in the document. The other item of notable reference is the reduction of the post_authentication daemon sleep- timer to 3- seconds. To aids in making the update between CPPM and the PANW more real- time. 8
9 CPPM Basic Configuration - All CPPM Versions CPPM Basic Configuration - Insight Before we commence the configuration of the Palo Alto Networks services/profiles, etc., we need to ensure that some of the basic configuration items are covered. From CPPM 6.1.x and all later releases the Insight Database is disabled by default. This must be enabled on CPPM on a single box or somewhere in the cluster for the Palo Alto Networks integration to function. Check under Administration > Server Manager > Server Configuration > System and if the Enable Insight is not enabled, enable as appropriate. Figure 2 - Checking Insight DB is enabled Why we need INSIGHT - The Insight Application must be running. It is used to collate the records that make up the XML API we send to the Palo Alto Networks Endpoint. The RADIUS Authentication triggers a NetEvent from which we write data into the Insight DB. When Insight receives the RADIUS Accounting data (again from a NetEvent) we match this data with the MAC address to update the SRC IP address in Insight. Having the IP address we are then able to fingerprint the device and obtain the endpoint device- type etc. 9
10 CPPM Basic Configuration - Interim Accounting Next, we have to ensure that CPPM is logging the RADIUS Interim- Accounting Updates. This can be checked at the following Administration > Server Manager > Server Configuration > Service Parameters as shown below. Note that the default is FALSE. Ensure you have it configured as TRUE as shown below. Scroll to the bottom to see the Accounting drop- down- box. Figure 3 - Checking RADIUS Interim- Accounting is enabled on CPPM NAS/NAD Basic Configuration Interim Accounting Ensure RADIUS interim accounting is also enabled on the NAS device. Also important to ensure that the calling- station- ID is set to use the MAC address of the client (this is the default for Aruba controller). If the NAS device is configured to use the system IP address, we will not be able to collate the data correctly within Insight, and thus will be unable to send the correct data to the Palo Alto Networks Firewall or Panorama system. Note: Cisco uses the system IP address by default, ensure this is changed as shown below. 10
11 For Aruba controllers, enable RADIUS Interim accounting as shown below. Figure 4 - Enable RADIUS Interim accounting on Aruba Controller For Cisco controllers, ensure RADIUS Authentication and RADIUS Accounting are configured as shown below. taking special notice that the Call Station ID Type is set to System MAC Address. Figure 5 - Configuring RADIUS authentication on Cisco WLC Figure 6 - Configuring RADIUS accounting on Cisco WLC 11
12 CPPM Basic Configuration Post_authentication processing The data that CPPM collates and writes to the Insight DB is extracted and written to the Palo Alto Networks Firewall or Panorama endpoint by the post_authentication daemon. This daemon run at periodic times as shown below. The version of CPPM deployed will dictate the frequency this daemon runs and how this can be adjusted. See below to understand the run- time/sleep frequency values of this daemon. Note that there are multiple stages from a client/endpoint associating to an AP or bringing up the carrier on an Ethernet port to the information being posted to the Palo Alto Firewall. Several seconds can elapse before the client has authenticated and obtained its IP address and the NAS has sent RADIUS Accounting packets to ClearPass (we need this for the client IP address). Assuming that Profiling is enabled ClearPass then will profile the endpoint. Following these steps ClearPass has all of the attributes it needs to be able to update the Palo Alto Networks endpoint. The process to gather all the contextual data into a format that we send has been streamlined over several releases. Once the data is gathered there is a batch process which POST s this data to the PANW. This batch process is the called the post_auth daemon that is discussed below and on some of the following pages. The below table shows the settings of the post_auth daemon. Note that in CPPM 6.2 we split the post_auth daemon into the lazy and eager handler. CPPM Version Max / Min / Default Values Recommended Value Expected delay in endpoint appearing in PANW 6.1.x 10 mins / 3 mins / 5 mins 3 mins 2-3 mins 6.2.x 300 sec / 10 sec / 30 sec 10 sec ** seconds 6.3.x 300 sec / 10 sec / 30 sec 10 sec ** seconds 6.4.x 300 sec / 10 sec / 30 sec 10 sec ** seconds sec / 3 sec / 30 sec 10 sec ** seconds Figure 7 - Post Authentication run- times across different CPPM versions ** Lowering the Eager handler must be done with care to not effect other system functions. The entire process of a device associating, authenticating, and getting an IP address, to CPPM profiling the data and then the daemon sending this information to PANW can take a number of seconds. The process to gather all of the data was significantly streamlined in CPPM 6.3 under a process called the real- time- framework. Read more later on the Real- Time Framework on the next page under Real- Time Framework introduced post CPPM
13 post_authentication configuration for CPPM 6.5/6.4/6.3 CPPM 6.5 introduces some new features related to Palo Alto Networks Integration. Specific to the post_authentication eager_handler daemon, we lowered the minimum value to 3 seconds. What this 3- seconds refers to is the interval sleep- timer the daemon will wait until the next processing cycle. It looks for new session details that have been gathered that are complete that ClearPass can post to the PANW firewall (the process to harvest the endpoint info is performed by the Real- Time Framework); it runs, then goes to sleep for this interval, then runs again, etc. Figure 8 - Modifying the Post- authentication daemon sleep- time under CPPM 6.5/6.4/6.3 Real- Time Framework introduced post CPPM 6.3 Post the CPPM 6.3 release we introduced an improved framework that provides near- real- time processing for certain functions within CPPM. One of the functions able to take advantage of this is the Palo Alto Networks integration. Previously minor delays could have been experienced between CPPM receiving the initial RADIUS Auth Request and CPPM updating the Palo Alto Networks endpoint with the relevant meta- data: Username, IP address, Device- Type, etc. With the Real- Time Framework and the lowering of the Eager- Handler the updates to the Palo Alto Networks endpoint should arrive in a few seconds. Note: No configuration changes are necessary to benefit from this new framework. All the improvements are transparent to the CPPM administrator and happen under- the- covers. post_authentication configuration for CPPM 6.1 and 6.2 Figure 9 below shows the configuration options for the post_authentication daemon under CPPM 6.1.x. Notice that only a single value is configurable, this is a system wide setting. Figure 9 - Modifying the post_authentication daemon sleep- time under CPPM 6.1.x 13
14 Figure 10 below shows the configuration options for the post_authentication daemon under CPPM 6.2.x. Note: It s important to note that back in the 6.2 release we split the post_authentication processing into two separate processes. The eager handler is responsible for the Palo- Alto Networks updates, whilst the remaining post_authentication processing is handled by the lazy handler. Figure 10 - Modifying the post_authentication daemon sleep- timer under CPPM 6.2.x Note: CPPM 6.2 lowers the post_authentication processing delay of the Palo Alto Networks updates. Whilst it can be set as low as 10 seconds, the default of 30 seconds remains the recommendation under CPPM 6.2. Care should be taken when lowering this value as system resources for this daemon may need to be carefully managed. 14
15 Adding PANW Firewall & Panorama context servers endpoints Some minor differences exist in the GUI Context server configuration depending on the version of ClearPass in use. These relate to Aruba enhancing the integration capabilities between ClearPass Policy Manager and Palo Alto Networks firewalls. Adding PANW Context Servers in CPPM 6.5 & 6.4 Under Administration > External Server > Endpoint Context Servers > Add Context Server > [choose] Palo Alto Networks Firewall, then enter the required IP address of the Palo Alto Networks Firewall, and a username/password pair that ClearPass will use to send context endpoint data to the Palo Alto Networks Firewall. Figure 11 - Adding a Palo Alto Networks Firewall in CPPM 6.5 & 6.4 We discuss configuring the username on the Palo Alto used above in a later section, Configuring Palo Alto Networks Next- Generation Firewall. Note: Do not change the Server Base URL or UserID Post URL. Although the fields can be modified, they are specifically formatted to work with a Palo Alto Networks firewall running PAN- OS 5.x or 6.x software. Note: On earlier version of CPPM 6.2/6.1 the option to select GlobalProtect did not exist. Enabling GlobalProtect on CPPM signifies that CPPM can send Host Information Profile (HIP) Objects to the Palo Alto Networks endpoint to allow it to apply enforcement policies based upon the HIP context attributes received for a user/endpoint; this is in addition to the more basic UserID XML API attributes. HIP data allows us to send more granular context about the endpoint. As an example, when sending context about the endpoint with 15
16 the UserID XMLAPI we might inform the PANW the endpoint is a SmartDevice. With HIP data we could actually inform the PANW the endpoint is a Apple ipad running IOS 7, so a significantly more granular level of data. Also starting with CPPM 6.4 we improved the ability of CPPM to send/append the domain level data for a user when they authenticate. In the scenario where a user authentication is not in the format DOMAIN\username and we just receive a username, we can now configure CPPM to append the DOMAIN to the username. CPPM 6.3 or less had an option to send Full Username in the UID updates to PANW. The Full Username prefix can include the user domain (NETBIOS name as in case of Active Directories) or an LDAP domain (less frequent as in case of OpenLDAP or a non- AD source). In 6.4 this option is deprecated and replaced with Prefix NETBIOS name. This addresses a portion of the problem when a domain prefix is available if the user is authenticated against an AD. When None is selected UID updates will have entry as username; HIP Report also will have only the username. When Prefix NetBIOS Name is selected UID updates will have entry as NetBIOS Name\username; HIP Report will also have NetBIOS Name\username, will also include NetBIOS Name as domain field. When Use Full Username is selected UID updates will have entry as Full Username propagated by policy server, if authentication is against AD it will be similar to above NetBIOS Name\username, else Some Other Domain\username in case of say Guest Captive Portal or Username@somedomain which is not accepted by Palo Alto, HIP Report will have same entry, but the domain field will not be sent. Figure 12 - Appending DOMAIN/Full- username Note: CPPM normalizes the formatting sent to the PANW endpoint as domain\username. If we receive an incoming ID that reads [email protected], we ll send ARUBANETWORKS.COM\danny as the payload. If we receive ARUBANETWORKS.COM\danny, we ll send ARUBANETWORKS.COM\danny as the payload to PANW endpoint. The Palo Alto Networks firewall can only accept the UserID in the following format domain\username, policies on the PANW can then be set on the domain portion of the domain\username if required. 16
17 Adding Palo Alto Networks Panorama Context Server Endpoint Under Administration > External Server > Endpoint Context Servers > Add Context Server > [choose] Palo Alto Networks Panorama, enter the required IP address of the Palo Alto Networks Panorama server and a username/password pair that ClearPass will use to send the information. In addition, it s very important that you configure the serial numbers of the Palo Alto Networks firewall that are under management by the Panorama appliance as shown below, e.g in Figure 13. We discuss configuring the username used below in a later section Configuring Palo Alto Networks Next- Generation Firewall. Figure 13 - Adding Palo Alto Networks Panorama endpoint Note: Do not change the Server Base URL or UserID Post URL. Although these fields can be modified, they are formatted to work with Palo Alto Networks Panorama running 5.x or 6.x software. The same option is discussed in the previous section in relation to the support for GlobalProtect, and appending Domain information to usernames is supported within the Panorama configuration. 17
18 Summary of Shared Context Attributes The following table details the contextual attributes ClearPass Policy Manager currently shares with the Palo Alto Networks endpoints. Attribute CPPM 6.1.x & 6.2.x CPPM 6.3/6.4 CPPM 6.5.x UserID Source IP Device Type Domain Name [1] [2] [1] [2] Host Name [1] [1] Per- Class Health/Posture [3] Figure 14 - Attributes we can share with Palo Alto Networks endpoints Note: [1] These attributes are passed from CPPM to the Palo Alto Networks endpoint via HIP Objects. The Palo Alto Networks endpoint MUST have a Global Protect License installed to be able to utilize the received HIP data and thus use it in its policy enforcement. Note: [2] The Domain Name can be passed starting in CPPM with the UserID XML API or via the HIP Objects enabled by use of the GlobalProtect License. Note: [3] To capture the Health/Posture context for an endpoint requires that OnGuard be installed on that endpoint. OnGuard is available for Windows/Mac OS X/Ubuntu. We added the ability to send this endpoint context in CPPM
19 After completing the steps in the previous sections, there are a couple of final steps to ensure that as users are authenticated with ClearPass, information is sent to update the Palo Alto Networks endpoint. This is performed using post_authentication Session Restrictions profiles. Triggering Updates from ClearPass to a PANW endpoint post 6.5 In CPPM 6.5, changes were made to expand the Policy Manager Exchange Framework. This resulted in a new post_authentication profile type Session Notification Enforcement being created. Note that for CPPM systems migrating from 6.4 or earlier we will migrate the previous CPPM enforcement profile used (Session Restrictions Enforcement profiles) to the new enforcement profile type. Adding this enforcement profile for PANW is slightly different from previous CPPM versions. An example is below. Note that you have to specify two attributes of type Session- Notify, a Server- Type and a Server IP. If you have not previously defined the PANW context server endpoint, then when trying to configure this step nothing will be available in the drop- downs. Figure 15 - Adding an enforcement- profile for PANW in CPPM
20 Triggering Updates from ClearPass to a PANW endpoint pre 6.5 Create a new Enforcement Profile as shown. Ensure this profile is created from the Session Restrictions Enforcement template. Select Type to be Session- Check as shown below, then Name to be IP- Address- Change- Notification and finally from the Value field the IP address of the Palo Alto Networks endpoint. Figure 16 - Adding a Session Restriction Enforcement profile Type = Session- Check Name = IP- Address- Change- Notification Value = Palo Alto Networks endpoint, previously added (this is a drop- down list) Note: If you don t see the IP address of a Palo Alto Networks endpoint, you have likely missed a step in one of the earlier sections, likely you have missed adding the endpoint under the Context Servers. Note: If you have multiple Palo Alto Networks Firewall / Panorama then you must create multiple Enforcement Profiles, one per endpoint. The option exists as shown below to add multiple Palo Alto Networks endpoints to a single enforcement profile, however this configuration is invalid. Figure 17 - Adding a Session- Check... one endpoint per profile 20
21 Adding an Enforcement Profile to a Enforcement Policy From this point to complete the configuration it's a very standard CPPM workflow. A enforcement policy needs to be created using what ever criteria you need. Be this based upon a AD group membership match (as in our example below), or an authorization match or a match from within the user s presented certificate. The choices are virtually unlimited. Following this add the enforcement policy to a service profile. In our below example, CPPM will send an update when the authenticated user is a member of the AD Group ns- tme in our Active- Directory win28k. Figure 18 - Trigger PANW update on AD memberof Adding an Enforcement Policy to a Service Policy Adding the Enforcement policy to a service policy, a very simple example. Figure 19 - PANW enforcement profile added to a service policy 21
22 Sending Health/Posture status to PANW from CPPM The ability for CPPM to send Posture/Health context to PANW was a feature introduced in the CPPM 6.5 code release. To take advantage of this feature requires several moving parts. The full configuration of OnGuard is beyond the scope of this document. By adding this new functionality ClearPass provides additional valuable context about the endpoint and the health/posture of that device. By utilizing the ability for ClearPass Policy Manager OnGuard NAC client to capture valuable endpoint context we enhance the ability of the PANW firewall to make more enhanced granular policy enforcement decisions. The OnGuard client has the ability to report multiple individual attributes about a health/posture class (listed below), As an example for antivirus: is the AV Product current/back level, is the AV engine current/back level, has the signature data- file been updated in the last X hours, when was the last scan performed, is real- time scanning enabled. The complete list of classes we check within the CPPM 6.5 release are as follows; note that different checks can happen based upon the Client OS. Client Version Check File Check Process s Check Virtual machine Check Firewall Check AntiVirus Check AntiSpyWare Check Network Connection Check Hotfixes Check Installed Applications CPPM then evaluates this information and reports up to the PANW, again at an individual class level with a posture token that can be one of the following as configured by you (in OnGuard): healthy / quarantined / checkup / transition / infected / unknown per class. For the PANW to take advantage of this context requires configuration on CPPM and within the PANW. Below we discuss the configuration required within CPPM and PANW to make this happen. Configuring OnGuard on ClearPass The configuration of the OnGuard client and Policy is beyond the scope of this document. But in brief we recommend that you use the standard wizard supplied with CPPM to build the basic service policy definitions and then create your posture policies as required per platform Windows/OSX/Linux. 22
23 Configuring PANW to use Health/Posture context Within the PANW firewall we utilize TAGS and ADDRESS- GROUPS to match the data posture/health context sent by CPPM. These items need to be pre- created within the PANW. Configuring TAGS for Health/Posture Under the Device Tab- >TAGS [Add] create the following tags. The names and case have to be a 100% match to the list below, else the data sent by CPPM will not match and the policy enforcement will fail. Figure 20 - Configuring TAGS on PANW Below is a list that can be copied as a reference for the above TAGS when configuring them with in the PANW firewall. ClientVersion_Not_Healthy FileCheck_Not_Healthy Processes_Not_Healthy VirtualMachine_Not_Healthy Firewall_Not_Healthy AntiVirus_Not_Healthy AntiSpyWare_Not_Healthy NetworkConnection_Not_Healthy Hotfixes_Not_Healthy InstalledApplication_Not_Healthy Figure 21 Copy of Not_Healthy TAGS 23
24 As you can see we are creating TAGS with _Not_Healthy extensions. We want to capture and enforce when people are outside the policy, not when they are compliant. After creating the TAGS we assign them to an Address Group, as below. Address Groups are a collection of TAGS, but the Address- Group match can be built using Boolean AND / OR joins to make for very granular and specific policy rules. See the Address Group below where we are looking for ANYTHING un- healthy to trigger a match. Figure 22 - Creating an Address- Group to match on ANYTHING unhealthy For our testing we also created some individual checks; they are self- explanatory. Figure 23 - Creating different Address- groups to check on individual failures 24
25 Once the Address Groups have been created, and you could have multiple ones according to how you want to enforce/restrict users based upon their health/posture context, you can apply these to policies within the PANW firewall. Figure 24 - Adding an Address- group to and firewall policy Setting the CPPM Posture/Health Delay Timer When utilizing CPPM s ability to send OnGuard posture/health status to a Palo Alto Networks endpoint, you must set the post_authentication eager timer to a MINIMUM of 120 seconds. This is required to allow the OnGuard client time to receive the policy analysis required for the endpoint and then trigger the local processing on the endpoint to analyze and post the results back to CPPM. For this reason we strongly recommend the eager- timer is set to 120 seconds. Figure 25 - Setting Eager handler to 120 seconds when sending posture/health 25
26 Configuring Palo Alto Networks Next- Generation Firewall Several steps must be completed to take advantage of the integration we have developed. Many use cases exist in the scope of this integration to manage and control a user s access to different resources. We have documented the configuration on the firewall to allow ClearPass to send data to the Palo Alto Networks endpoint and then for the Palo Alto Firewall to be able to use this data/context to make enforcement decisions. Configuring CPPM to communicate just using the XMLAPI For ClearPass to send data to a Palo Alto Networks firewall or Panorama, an account needs to be configured within the Palo Alto Networks firewall/panorama endpoint. You could utilize the built in admin account; however we do not recommend this. Please create a new account to be used solely for the purpose of ClearPass communicating with the Palo Alto Networks firewall. We recommended creating a role- based admin account. By utilizing the role- based admin account, the account can be limited to only communicating with the Palo Alto Networks firewall via the XML API. Note: The account created here needs to match that configured in the endpoint context server on CPPM when adding the Palo Alto Networks endpoints. Under the Device tab and Admin Roles create an admin- role as below. Ensure that you disable all the options on the Web UI Tab and the XML API except the User- ID Agent as shown below. Figure 26 - Creating an restricted Admin- Role 26
27 Now we create the actual Admin userid we will use when defining the PANW endpoint on CPPM in the context- server definition. Again, under the Device tab but this time under Administrators create an admin user. Figure 27 - Adding a User to Palo Alto Networks Firewall In this example we have added an admin user called admin- cppm, but it references the profile cppm- xml- role we created in the pervious step. Configuring a Policy on PANW to use CPPM context data generic info. In PAN- OS 6.x there is a feature called Dynamic Address Groups (DAG) that is used to create labels/tags for endpoints. These DAG s are then used for enforcement. They have replaced the Dynamic Address Objects (DAO) from PAN- OS 5.x. The XMLAPI that CPPM uses to send data has not changed, it s the way this received data is utilized and configured on the firewall that is a little different. In 5.x you created a DAO with an identifier, then via the XMLAPI you attached endpoint IP s to that identifier, and they will show up in the DAO. Starting in PAN- OS 6.0, you create TAGS and then combine these identifiers together under an Address Group. You can use Boolean logic like AND / OR to combine multiple tags in the Address Group. Then through the XMLAPI you attach the client s IP address to the tags. The tags become part of that Address Group, similar to the process under PAN OS- 5.x A Palo Alto Networks firewall can then enforce a policy utilizing dynamic objects, DAO and DAG s. In essence they provide the same type of functionality, an object type that is not tied to a fixed IP address. Aruba s ClearPass can complement a Palo Alto Networks firewall by supplying the dynamic object data and mapping an endpoint to a dynamic object or tag. Note: If you only use one tag, then a DAG is the same as a DAO. But the difference is you could use more than one tag and associate them with AND and OR to make complex conditions for an IP appearing in the DAG. 27
28 Creating Device Profile Categories We have to manually create the device categories in PAN- OS. Starting in CPPM 6.3 we enhanced the granularity of the endpoint information we are able to send to the Palo Alto Networks endpoint. Prior to this release we were only sending the Device Category, e.g. Computer or SmartDevice. In CPPM 6.3 we now utilize the power of the CPPM Profiler to classify the endpoint and use the most granular level of information available to provide this context to the Palo Alto Networks endpoint. A device profile is a hierarchical model consisting of 3 elements DeviceCategory, DeviceFamily, and DeviceName derived by Profile from endpoint attributes. DeviceCategory - This is the broadest classification of a device. It denotes the type of the device. Examples include Computer, SmartDevice, Printer, Access Point, etc. DeviceFamily - This element classifies devices into a category and is organized based on the type of operating system or vendor. For example, when the category is Computer, ClearPass Policy Manager could show a DeviceFamily of Windows, Linux, or Mac OS X, and when the Category is Computer, ClearPass Policy Manager could show a DeviceFamily of Apple or Android. DeviceName - Devices in a family are further organized based on more granular details, such as operating system version. For example, in a DeviceFamily of Windows, ClearPass Policy Manager could show a DeviceName of Windows 7 or Windows 2008 Server. This hierarchical model provides a structured view of all endpoints accessing the network. As a reference, the list of Device Category/Family or Name of a device that was authenticated in ClearPass can be viewed under Administration >Dictionaries > Fingerprints. Figure 28 - CPPM Fingerprints 28
29 Configuring Palo Alto Networks PAN- OS 6.x - Tags and HIP Objects There are two methods we can use to match device/user context that we send from CPPM that can be used within the PANW policies. The first method is Tags the second is HIP. Tags can be manually (static) or automatically (dynamically) created, we typically use the static tags as we know what they well be!! Dynamically created tags are typically unknown. Once you decide on the Categories of devices you require from CPPM, create them on the Palo Alto Networks firewall as Tags. PAN- OS 6 differs from previous version, Tags now replace Dynamic Objects. We discussed creating TAGS previously. Note: Profiling must be enabled or CPPM is unable to send HIP level data. To create the Tags select the Object Tab, then Tags and then on the bottom LHS click to add a new Tag. Below you can see a number of example Tags we have created. Figure 29 - Adding a TAG under PAN- OS 6.x Group TAGS in Address Groups Following on from creating the individual Tags you have the option to group these together. In this example we created multiple Tags for different Apple device types, then grouped them together under a generic Apple grouping in an Address Group. Note: Boolean logic can be applied to the match criteria to enhance the selection of a match. Note also that when creating the Address group, the Address Group created must be of a type dynamic. 29
30 Figure 30 - Grouping Tags into a Dynamic Address Group To create the HIP Objects select the Object Tab, then under GlobalProtect, you ll find HIP Objects and HIP Profiles, on the bottom LHS click to add a new HIP Object. HIP Profiles are a collection of HIP Objects in a similar way that Address Groups are a collection of Tags. When creating a HIP Object only the General Tab can be referenced for the match. An example below matches Host OS as shown with contains Apple. Figure 31 - Creating HIP Objects 30
31 Other Attributes from HIP Object/General explained Domain is in the context of the attribute Domain\Username from a users login. Client Version comes from the attribute Name in the CPPM fingerprints DB, see below. Host Name is in the context of the attribute we profile from the endpoint. The below extract from our fingerprint DB shows a small subset of device- types that we can match against for HIP context. Currently the fingerprint DB shipped includes in excess of 350 fingerprints. We continue to add/update these through our bi- weekly fingerprint update that is automatically pushed to all Internet- connected CPPM nodes with an active subscription license. You are actively encouraged to send new fingerprints to us by opening a TAC case. Figure 32 - CPPM Fingerprints Client Version Now with the Palo Alto Networks firewall you can reference advanced context supplied by CPPM to allow decisions to be made in how traffic should be processed by the firewall. Figure 33 - Utilizing Tags in a Firewall Rule 31
32 Configuring Palo Alto Networks PAN- OS 5.x - Dynamic- Objects If you re still running on PAN- OS 5.x then you still need to create the labels on the PANW firewall to match the Categories of devices sent from CPPM in a similar way to how we interact with PAN- OS 6.x. You must create these via the GUI in the PANW firewall. Select the Object Tab and then under Addresses on the bottom LHS click to add a new device. Pay special attention to the box on the right- hand- side as this entry must match the Category in CPPM that is transmitted via the XMLAPI. Type must be that of Dynamic as shown below. Figure 34 - Configuring Dynamic Objects under PAN- OS 5.x Note: The object name MUST be unique. Only then can the object be referenced in a security policy as a source or destination address. Below is an example of a list (not complete) of dynamic Categories that CPPM can register an IP address against via the XMLAPI update process. Figure 35 - Palo Alto Networks 'dynamic' objects Note: When creating definitions on the Palo Alto Networks firewall, a category type under ClearPass can use a space in the name. Ensure that on the Palo Alto Networks firewall, dynamic object definitions with a space are created with an underscore for example, Game_Console not Game Console. After the objects are created, the power of the Palo Alto Networks Policy engine can be leveraged. An example firewall rule that exploits this is shown below, allowing gaming consoles to the WEB and similarly restricting access to Corporate VoIP Phones. 32
33 ClearPass 6.x Tech Note: ClearPass and Palo Alto Networks Integration Figure 36 - Basic Firewall Rules Historically, traditional firewalls classify traffic based on port number and IP address. However, port number is no longer a meaningful way to classify traffic, because any application can use any port number. The Palo Alto Networks next- generation firewall classifies traffic by application, and enforces policy based on the context of business elements such as application, user, and content. The following rule shows the use of device types rather than IP address as a source address in the Trust zone, below we are specifically making an enforcement decision on the context type of the endpoint. Note, this device- data has been shared by ClearPass Policy Manager. Figure 37 - Firewall Rule Based Upon a Source- Device- Type of an endpoint 33
34 In a similar way we can exploit the power of the Palo Alto Networks policy engine to make permit/deny decisions based upon a username. In the example below, we are selecting users marc and dannyjump in creating this particular policy. These UserID s would have been received directly from CPPM via the XMLAPI. Again legacy firewalls would typically restrict or allow users sessions based upon one of the basic 5- tuple identifiers only, now we can utilize additional context to apply a firewall policy using next generation object- level context. Note, this user- data has been shared by ClearPass Policy Manager. Figure 38 - Firewall Rule Based Upon a Source of a User Name PAN- OS 6.x Changes to DAO Limits PAN- OS 5.x had a restriction in that you could not allocate more than 256 IP addresses per DAO. Within PAN- OS 6.x, these limits have been significantly expanded. The new limits on a per- platform basis are as follows: PA- 7000, PA- 5060, VM- 300: 100K PA- 5050: 50K PA- 5020: 25K PA- 4000/3000: 5K PA- 2000/500/200/VM- 100/VM- 200: 1K These limits are the number of IP addresses that can have a tag on the platform. These limits are shared across all VSYS on the platform. 34
35 Faultfinding Tips (PANOS cli cmds/cppm Logs) There are several commands and log- files available within the Palo Alto Networks Firewall and CPPM to assist a user in identifying communication and integration problems. The first section covers some useful cli commands to assist in debugging the Palo Alto Networks environment. Note that as Palo Alto has developed their features not all command below are support on all releases. Some commands were deprecated between PAN- OS 5.x and PAN- OS 6.x, we have made reference to this below. Following this is a section on CPPM debugging. UserID <- > IP Address Mapping (PAN- OS 5.x & 6.x cmd) To look at the user s that are logged in and their IP address mapping, use the following command.. show user ip- user- mapping all Figure 39 - Signed in User s to their IP Mapping If you use the command show user ip- user- mapping ip [ip address] it shows you a little additional information where user attributes are being used by PANW policies. Figure 40 Signed in Users to their IP Mapping and also matched policy hits 35
36 Dynamic Device (Tag) <- > IP Address Mapping (PAN- OS 5.x & 6.x cmd) The debug user- id dump registered- ip all command shows any IP addresses with tags. This is part of Dynamic Address Groups (DAG) under PAN- OS- 5.x. With the changes in the PAN- OS 6.x this doesn t relate to users or HIP, so this command is deprecated in PAN- OS 6.x Figure 41 - Dynamic Object Category - IP Address Mapping If you want to see logged in users in PAN- OS 6.x, use the command show user ip- user- mapping all as shown below. Figure 42 - Logged in user in PAN- OS 6.x 36
37 Show HIP Reports To display the HIP data related to an endpoint (assuming it is available) use the command debug user- id dump hip- report note you have to specific additional context about HIP report computer/user/ip on the cmd Figure 43 - HIP Report for a user Note that in PAN- OS 6.x there are no longer Dynamic Address Objects (DAO), so the dynamic option has been removed. Instead, look under the Address Groups menu for equivalent of the Dynamic Address Groups (DAG), now known as TAGS. Show XMLAPI statistics The below is a high level view of the XMLAPI statistics, if there is zero activity here then you can assume some serious configuration or network problems exist between CPPM and the Palo Alto Networks endpoints. debug user- id dump xmlapi- stats Figure 44 - XMLAPI Stats 37
38 Active real- time debug monitoring of the UserID process A very effective way to monitor the XMLAPI process in real- time is using the following commands, this will set up an interactive self updating (like tail f) rolling update for the UserID process. debug user- id on debug debug user- id set userid all tail follow yes mp- log useridd.log Note: Remember to disable the logging debug user- id off Our final debug command for the Palo Alto Networks Firewall shows all of the UserID Manager Data. This shows all users that have been registered through the XMLAPI process. debug user- id dump idmgr type user all Figure 45 - List of ALL users registered through ID Manager 38
39 Check Logs files in CPPM CPPM collects multiple log files that can assist the user in debugging a CPPM to Palo Alto Networks integration problem. The most useful of these logs is the postauthctrl.log file. As you know the trigger that sends data via the XMLAPI is performed by the post_authentication daemon. Checking this log file can provide an insight in to the working of this process on the CPPM side and possible issues related to the communication with Palo Alto Networks endpoint. To collect and access this log file takes multiple steps, please follow these steps: Under Administration - > Server Manager - > Server Configuration, select your system if you have a cluster then Collect Logs. Once this process has completed you need to download this tar file and open with an appropriate application. For OS- X, finder will allow you to extract the file to a folder for analysis with the built in Archive Utility. For MSFT Windows multiple applications exist, but a really good free utility is 7- Zip zip.org. Note: You only need to collect as highlighted below Logs from all Policy Manger services to obtain the postauthctrl.log file. This will save significantly on the log collection process and the corresponding download file is much smaller. If you are not able to analyze an issue and you engage Aruba TAC s it is likely they will want System logs in addition to the Policy manager services logs. Figure 46 - How to collect CPPM Logs limited data, but includes postautctrl.log 39
40 Figure 47 - Collection of CPPM Logs complete After you have opened the archive, the postauthctrl.log file can be found in the following path PolicyManagerLogs/async- netd/postauthctrl*.log Figure 48 - Where to locate postauthctrl.log Once you have located the postauthctrl.log file, there are certain entries you will want to look for, several examples are shown below. These provide an insight into the XMLAPI communication between CPPM and the Palo Alto Networks Firewall. Once a user has associated and been authenticated, if the service match that authenticates the user has a post_authentication Palo Alto Networks trigger then you should be able to match that session to an entry in this log file. Below are five example messages sent from CPPM to a Palo Alto Network endpoint, you d expect to find these or very similar ones within the postauthctrl file. The last one shown is specific for HIP Objects. 40
41 Sending login UserID + Source IP@, as user logs in <uid- message> <version>1.0</version> <type>update</type> <payload> <login> <entry name="dannyj" ip=" "/> </login> </payload> </uid- message> Adding IP@ to Category, as CPPM profiles the IP@ <uid- message> <version>1.0</version> <type>update</type> <payload> <register> <entry identifier="smartdevice" ip=" "/> </register> </payload> </uid- message> Sending logoff UserID + IP@, as user logouts <uid- message> <version>1.0</version> <type>update</type> <payload> <logout> <entry name="dannyj" ip=" "/> </logout> </payload> </uid- message> Removing IP@ from Category as device logout <uid- message> <version>1.0</version> <type>update</type> <payload> <unregister> <entry identifier="smartdevice" ip=" "/> </unregister> </payload> </uid- message> 41
42 XML example of HIP Object Sending username, domain- name, host- name, and client- version (OS- type). <uid- message> <version>1.0</version> <type>update</type> <payload> <login> <entry name="cppmeccert\certuser1" ip=" "><hip- report> <md5- sum>aaea39d589a1f7540d137e56a6d60b31</md5- sum> <user- name>certuser1</user- name> <domain>cppmeccert</domain> <host- name>toshi- driver- 32</host- name> <ip- address> </ip- address> <generate- time>06/03/ :01:31</generate- time> <categories><entry name="host- info"> <host- name>toshi- driver- 32</host- name> <domain>cppmeccert</domain> <client- version>windows 7</client- version> </entry></categories> </hip- report></entry> </login> </payload> </uid- message> Conclusion Aruba s ClearPass in conjunction with Palo Alto Networks can provide administrators with full context and visibility about the users and devices on the network to deliver end- to- end safe application enablement. We continue to evolve ClearPass to provide more contextual information about endpoints and users to Palo Alto Networks endpoints to allow them to make more advanced policy decision with regard to the network and its users. 42
CLEARPASS ONGUARD CONFIGURATION GUIDE
CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...
ClearPass Policy Manager
ClearPass Policy Manager V2 October 2013 Introduction With the release of ClearPass Policy Manager 6.2.0 in July 2013 we have continued to build on our previous industry leading functionality, now with
Architecting User Identification (User-ID) Deployments
Architecting User Identification (User-ID) Deployments Strategies and Tactics guide PANOS 5.0+ Table of Contents SECTION 1: USER IDENTIFICATION SOFTWARE COMPONENTS EXTERNAL SYSTEMS REFERENCED BY USER IDENTIFICATION
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Use Host Information in Policy Enforcement
Use Host Information in Policy Enforcement Although you may have stringent security at your corporate network border, your network is really only as secure as the end devices that are accessing it. With
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Set Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
Manage Firewalls. Palo Alto Networks. Panorama Administrator s Guide Version 6.1. Copyright 2007-2015 Palo Alto Networks
Manage Firewalls Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Configuring GlobalProtect Tech Note PAN-OS 4.1
Configuring GlobalProtect Tech Note PAN-OS 4.1 Revision E 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents OVERVIEW...4 GLOBALPROTECT ELEMENTS...4 LICENSE REQUIREMENTS...4 DEPLOYMENT TOPOLOGIES...4
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting
Installation Steps for PAN User-ID Agent
Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID
Set Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
Self-Register & Self-Sponsor Solution (Validated email)
Self-Register & Self-Sponsor Solution (Validated email) Derin Mellor Aruba Networks Michael Clarke Secure Data Ltd CPPM v 6.3.4 AOS v 6.3.1.8 21 st July 2014 v 1.4 Overview... 3 Workflow... 4 Controller
ClearPass Policy Manager 6.3
ClearPass Policy Manager 6.3 Tech Note: Installing or Upgrading on a Virtual Machine This document describes the procedures for installing and upgrading ClearPass Policy Manager 6.3 on a Virtual Machine.
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
iboss Enterprise Deployment Guide iboss Web Filters
iboss Enterprise Deployment Guide iboss Web Filters Copyright Phantom Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
PAN-OS Syslog Integration
PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Office 365 Windows Intune Administration Guide
Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any
tech note Palo Alto Networks Next- Generation Firewall and
Palo Alto Networks Next- Generation Firewall and Aruba WLAN Integration Table of Contents Overview Why is this Integration Important? Aruba Controller and Palo Alto Networks Firewall Integration Details
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Installation and Configuration Manual
Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Deployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
Configure ISE Version 1.4 Posture with Microsoft WSUS
Configure ISE Version 1.4 Posture with Microsoft WSUS Document ID: 119214 Contributed by Michal Garcarz, Cisco TAC Engineer. Aug 03, 2015 Contents Introduction Prerequisites Requirements Components Used
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
RMM/MDM. Quick Reference Guide
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
Set Up a VM-Series NSX Edition Firewall
Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA
PrinterOn Print Management Overview
PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
ClearPass Policy Manager 6.1
ClearPass Policy Manager 6.1 Quick Start Guide Copyright Information Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include the Aruba Networks logo, Aruba Networks, Aruba Wireless Networks,
Configuring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Global Protect SSL VPN Overview This document gives you an overview on how to configure
Manage Licenses and Updates
Manage Licenses and Updates Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Data Center Automation with the VM-Series
Data Center Automation with the VM-Series Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Process... 3 Creating the Gold Standard... 3 Initial
FlexSim LAN License Server
FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Device Management. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Device Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Citrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
ClearPass: Understanding BYOD and today s evolving network access security requirements
ClearPass: Understanding BYOD and today s evolving network access security requirements ClearPass: Understanding BYOD and today s evolving network access security requirements Chapter 1: Introduction............................
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
WildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Troubleshooting. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Palo Alto Networks Users Group. February 2014
Palo Alto Networks Users Group February 2014 Topics of Discussion Syslog configuration, Integration and supported partners Panachrome App Scope Destination NAT Wildfire decision making Pan OS 6.0 brief
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Manage Firewalls and Log Collection
Manage Firewalls and Log Collection Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
Configure your firewall for administrative access via RADIUS authentication
Configure your firewall for administrative access via RADIUS authentication Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Configure your Palo Alto firewall for RADIUS Authentication This guide
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Getting Started Guide
Getting Started Guide Sophos Firewall Virtual Appliance Document Date: November 2015 November 2015 Page 1 of 20 Contents Preface...3 Minimum Hardware Requirement...3 Installation Procedure...3 Configuring
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
vrealize Operations Manager Customization and Administration Guide
vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until
PassGuide.PCNSE6 (48Q)
PassGuide.PCNSE6 (48Q) Number: PCNSE6 Passing Score: 800 Time Limit: 120 min File Version: 4.9 http://www.gratisexam.com/ PCNSE6 Palo Alto Networks Certified Network Security Engineer 6.0 1. I was so happy
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
PI Cloud Connect Overview
PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
ClearPass Profiling TechNote
Tech Note: ClearPass Profiling TechNote Copyright Copyright 2014 Aruba Networks, Inc. Aruba Networks trademarks include AirWave, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
